Deprecated (16384): The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 73 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php. [CORE/src/Core/functions.php, line 311]Code Context
trigger_error($message, E_USER_DEPRECATED);
}
$message = 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 73 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php.' $stackFrame = (int) 1 $trace = [ (int) 0 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ServerRequest.php', 'line' => (int) 2421, 'function' => 'deprecationWarning', 'args' => [ (int) 0 => 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead.' ] ], (int) 1 => [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 73, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) {}, 'type' => '->', 'args' => [ (int) 0 => 'catslug' ] ], (int) 2 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Controller/Controller.php', 'line' => (int) 610, 'function' => 'printArticle', 'class' => 'App\Controller\ArtileDetailController', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 3 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 120, 'function' => 'invokeAction', 'class' => 'Cake\Controller\Controller', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 4 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 94, 'function' => '_invoke', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(App\Controller\ArtileDetailController) {} ] ], (int) 5 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/BaseApplication.php', 'line' => (int) 235, 'function' => 'dispatch', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 6 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Http\BaseApplication', 'object' => object(App\Application) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 7 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/RoutingMiddleware.php', 'line' => (int) 162, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 8 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\RoutingMiddleware', 'object' => object(Cake\Routing\Middleware\RoutingMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 9 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/AssetMiddleware.php', 'line' => (int) 88, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 10 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\AssetMiddleware', 'object' => object(Cake\Routing\Middleware\AssetMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 11 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Middleware/ErrorHandlerMiddleware.php', 'line' => (int) 96, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 12 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Error\Middleware\ErrorHandlerMiddleware', 'object' => object(Cake\Error\Middleware\ErrorHandlerMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 13 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 51, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 14 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Server.php', 'line' => (int) 98, 'function' => 'run', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\MiddlewareQueue) {}, (int) 1 => object(Cake\Http\ServerRequest) {}, (int) 2 => object(Cake\Http\Response) {} ] ], (int) 15 => [ 'file' => '/home/brlfuser/public_html/webroot/index.php', 'line' => (int) 39, 'function' => 'run', 'class' => 'Cake\Http\Server', 'object' => object(Cake\Http\Server) {}, 'type' => '->', 'args' => [] ] ] $frame = [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 73, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) { trustProxy => false [protected] params => [ [maximum depth reached] ] [protected] data => [[maximum depth reached]] [protected] query => [[maximum depth reached]] [protected] cookies => [ [maximum depth reached] ] [protected] _environment => [ [maximum depth reached] ] [protected] url => 'latest-news-updates/aadhaar-still-rife-with-security-flaws-bharti-jain-4673555/print' [protected] base => '' [protected] webroot => '/' [protected] here => '/latest-news-updates/aadhaar-still-rife-with-security-flaws-bharti-jain-4673555/print' [protected] trustedProxies => [[maximum depth reached]] [protected] _input => null [protected] _detectors => [ [maximum depth reached] ] [protected] _detectorCache => [ [maximum depth reached] ] [protected] stream => object(Zend\Diactoros\PhpInputStream) {} [protected] uri => object(Zend\Diactoros\Uri) {} [protected] session => object(Cake\Http\Session) {} [protected] attributes => [[maximum depth reached]] [protected] emulatedAttributes => [ [maximum depth reached] ] [protected] uploadedFiles => [[maximum depth reached]] [protected] protocol => null [protected] requestTarget => null [private] deprecatedProperties => [ [maximum depth reached] ] }, 'type' => '->', 'args' => [ (int) 0 => 'catslug' ] ]deprecationWarning - CORE/src/Core/functions.php, line 311 Cake\Http\ServerRequest::offsetGet() - CORE/src/Http/ServerRequest.php, line 2421 App\Controller\ArtileDetailController::printArticle() - APP/Controller/ArtileDetailController.php, line 73 Cake\Controller\Controller::invokeAction() - CORE/src/Controller/Controller.php, line 610 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 120 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51 Cake\Http\Server::run() - CORE/src/Http/Server.php, line 98
Deprecated (16384): The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 74 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php. [CORE/src/Core/functions.php, line 311]Code Context
trigger_error($message, E_USER_DEPRECATED);
}
$message = 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead. - /home/brlfuser/public_html/src/Controller/ArtileDetailController.php, line: 74 You can disable deprecation warnings by setting `Error.errorLevel` to `E_ALL & ~E_USER_DEPRECATED` in your config/app.php.' $stackFrame = (int) 1 $trace = [ (int) 0 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ServerRequest.php', 'line' => (int) 2421, 'function' => 'deprecationWarning', 'args' => [ (int) 0 => 'The ArrayAccess methods will be removed in 4.0.0.Use getParam(), getData() and getQuery() instead.' ] ], (int) 1 => [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 74, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) {}, 'type' => '->', 'args' => [ (int) 0 => 'artileslug' ] ], (int) 2 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Controller/Controller.php', 'line' => (int) 610, 'function' => 'printArticle', 'class' => 'App\Controller\ArtileDetailController', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 3 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 120, 'function' => 'invokeAction', 'class' => 'Cake\Controller\Controller', 'object' => object(App\Controller\ArtileDetailController) {}, 'type' => '->', 'args' => [] ], (int) 4 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/ActionDispatcher.php', 'line' => (int) 94, 'function' => '_invoke', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(App\Controller\ArtileDetailController) {} ] ], (int) 5 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/BaseApplication.php', 'line' => (int) 235, 'function' => 'dispatch', 'class' => 'Cake\Http\ActionDispatcher', 'object' => object(Cake\Http\ActionDispatcher) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 6 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Http\BaseApplication', 'object' => object(App\Application) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 7 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/RoutingMiddleware.php', 'line' => (int) 162, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 8 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\RoutingMiddleware', 'object' => object(Cake\Routing\Middleware\RoutingMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 9 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Routing/Middleware/AssetMiddleware.php', 'line' => (int) 88, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 10 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Routing\Middleware\AssetMiddleware', 'object' => object(Cake\Routing\Middleware\AssetMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 11 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Middleware/ErrorHandlerMiddleware.php', 'line' => (int) 96, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 12 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 65, 'function' => '__invoke', 'class' => 'Cake\Error\Middleware\ErrorHandlerMiddleware', 'object' => object(Cake\Error\Middleware\ErrorHandlerMiddleware) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {}, (int) 2 => object(Cake\Http\Runner) {} ] ], (int) 13 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Runner.php', 'line' => (int) 51, 'function' => '__invoke', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\ServerRequest) {}, (int) 1 => object(Cake\Http\Response) {} ] ], (int) 14 => [ 'file' => '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Http/Server.php', 'line' => (int) 98, 'function' => 'run', 'class' => 'Cake\Http\Runner', 'object' => object(Cake\Http\Runner) {}, 'type' => '->', 'args' => [ (int) 0 => object(Cake\Http\MiddlewareQueue) {}, (int) 1 => object(Cake\Http\ServerRequest) {}, (int) 2 => object(Cake\Http\Response) {} ] ], (int) 15 => [ 'file' => '/home/brlfuser/public_html/webroot/index.php', 'line' => (int) 39, 'function' => 'run', 'class' => 'Cake\Http\Server', 'object' => object(Cake\Http\Server) {}, 'type' => '->', 'args' => [] ] ] $frame = [ 'file' => '/home/brlfuser/public_html/src/Controller/ArtileDetailController.php', 'line' => (int) 74, 'function' => 'offsetGet', 'class' => 'Cake\Http\ServerRequest', 'object' => object(Cake\Http\ServerRequest) { trustProxy => false [protected] params => [ [maximum depth reached] ] [protected] data => [[maximum depth reached]] [protected] query => [[maximum depth reached]] [protected] cookies => [ [maximum depth reached] ] [protected] _environment => [ [maximum depth reached] ] [protected] url => 'latest-news-updates/aadhaar-still-rife-with-security-flaws-bharti-jain-4673555/print' [protected] base => '' [protected] webroot => '/' [protected] here => '/latest-news-updates/aadhaar-still-rife-with-security-flaws-bharti-jain-4673555/print' [protected] trustedProxies => [[maximum depth reached]] [protected] _input => null [protected] _detectors => [ [maximum depth reached] ] [protected] _detectorCache => [ [maximum depth reached] ] [protected] stream => object(Zend\Diactoros\PhpInputStream) {} [protected] uri => object(Zend\Diactoros\Uri) {} [protected] session => object(Cake\Http\Session) {} [protected] attributes => [[maximum depth reached]] [protected] emulatedAttributes => [ [maximum depth reached] ] [protected] uploadedFiles => [[maximum depth reached]] [protected] protocol => null [protected] requestTarget => null [private] deprecatedProperties => [ [maximum depth reached] ] }, 'type' => '->', 'args' => [ (int) 0 => 'artileslug' ] ]deprecationWarning - CORE/src/Core/functions.php, line 311 Cake\Http\ServerRequest::offsetGet() - CORE/src/Http/ServerRequest.php, line 2421 App\Controller\ArtileDetailController::printArticle() - APP/Controller/ArtileDetailController.php, line 74 Cake\Controller\Controller::invokeAction() - CORE/src/Controller/Controller.php, line 610 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 120 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51 Cake\Http\Server::run() - CORE/src/Http/Server.php, line 98
Warning (512): Unable to emit headers. Headers sent in file=/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php line=853 [CORE/src/Http/ResponseEmitter.php, line 48]Code Contextif (Configure::read('debug')) {
trigger_error($message, E_USER_WARNING);
} else {
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr68049506971e2-trace').style.display = (document.getElementById('cakeErr68049506971e2-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr68049506971e2-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr68049506971e2-code').style.display = (document.getElementById('cakeErr68049506971e2-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr68049506971e2-context').style.display = (document.getElementById('cakeErr68049506971e2-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr68049506971e2-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr68049506971e2-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 25521, 'title' => 'Aadhaar still rife with security flaws -Bharti Jain', 'subheading' => '', 'description' => '<div align="justify"> -The Times of India </div> <p align="justify"> <br /> <em>NEW DELHI: </em>In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside its defined territory, including foreign land, to enroll people and send data to UIDAI for processing. </p> <p align="justify"> The anomaly led a UIDAI committee, set up in the wake of the government's January 2012 direction to the authority to make its enrolment process more robust, to recommend installation of a GPS device in all enrolment devices. This would ensure that enrolment happened only within the geographical boundary of India and also in the states allocated to UIDAI. The cost of such device was covered in the revised cost estimates approved by the cabinet committee on UIDAI. However, the GPS feature was never implemented. </p> <p align="justify"> According to experts, non-enablement of GPS feature in the Aadhar enrolment device poses a security risk as it is possible to enroll people in non-Aadhar states as well as foreign territory if the operator of the enrolment agency connives with someone. Since UIDAI allows enrolment of a person anywhere in the country by any enrolment agency, even if a few agencies get &quot;compromised&quot;, a large number of ineligible people can get entry into the UIDAI database, thereby gaining access to banking services and DBT facility. </p> <p align="justify"> Though TOI repeatedly contacted UIDAI officials for their version, they were not forthcoming with a response. </p> <p align="justify"> The UIDAI's risk assessment exercise, assisted by HCL, also recommended other security upgrades such as scanning of proof of identity and proof of address documents furnished by the Aadhar applicant at enrolment, and uploading them as part of the enrolment packet. This way the enrolment data could be matched with scanned documents during a subsequent quality check. Scanning, however, would mean a delay of few minutes per enrolment, besides additional costs and manpower. Though UIDAI got the estimated extra cost on scanning approved by the CC-UIDAI, even this feature was never activated. </p> <p align="justify"> Even the offline system that UIDAI settled for to collect proof or identity/address documents, followed by their scanning by a vendor-document management service (DMS), has been far from perfect. Not only was the DMS late in picking up documents from the enrolment agencies, but it was found in some cases that the agencies never collected the documents. There were also instances of documents not matching details of the Aadhar applicant, or being torn. </p> <p align="justify"> Experts cautioned such weaknesses could be exploited by the enrolment agencies to enroll residents without any document, including for a monetary consideration. The risk assessment team had warned that with the connivance of the operator, it is possible that biometrics of a foreign national are captured to generate Aadhaar number to a local resident to give him two Aadhar numbers and also capture mixed biometrics of more than one person for a single enrolment. </p> <p align="justify"> Also found prone to misuse was a software that allows biometric exception cases. Primarily meant for the physically challenged, it enables such persons to be enrolled without fingerprints or iris scan. It has come to the UIDAI's notice that a few unscrupulous operators have misused this feature to enroll able-bodied people without biometric data. This led UIDAI to intensify back-end checks, which led to large-scale rejection of enrolment packets. </p> <p align="justify"> Incidentally, the UIDAI has earlier rejected a home ministry suggestion for a security audit of Aadhar enrolment system. </p> <p align="justify"> Though UIDAI used to get demographic data verified manually by operators, this was discontinued in order to speed up Aadhar generation for DBT purposes. Even the feature of having government supervisors posted at each enrolment station was eased over time. First, the government supervisor was replaced by the enrolment agency's own supervisor, and then, one operator was allowed to become supervisor for another, defeating the purpose of having a supervisor. </p> <p align="justify"> &nbsp; </p>', 'credit_writer' => 'The Times of India, 27 July, 2014, http://timesofindia.indiatimes.com/india/Aadhaar-still-rife-with-security-flaws/articleshow/39076802.cms', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'aadhaar-still-rife-with-security-flaws-bharti-jain-4673555', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 4673555, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 25521, 'metaTitle' => 'LATEST NEWS UPDATES | Aadhaar still rife with security flaws -Bharti Jain', 'metaKeywords' => 'aadhaar,UIDAI,uid', 'metaDesc' => ' -The Times of India NEW DELHI: In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside...', 'disp' => '<div align="justify">-The Times of India</div><p align="justify"><br /><em>NEW DELHI: </em>In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside its defined territory, including foreign land, to enroll people and send data to UIDAI for processing.</p><p align="justify">The anomaly led a UIDAI committee, set up in the wake of the government's January 2012 direction to the authority to make its enrolment process more robust, to recommend installation of a GPS device in all enrolment devices. This would ensure that enrolment happened only within the geographical boundary of India and also in the states allocated to UIDAI. The cost of such device was covered in the revised cost estimates approved by the cabinet committee on UIDAI. However, the GPS feature was never implemented.</p><p align="justify">According to experts, non-enablement of GPS feature in the Aadhar enrolment device poses a security risk as it is possible to enroll people in non-Aadhar states as well as foreign territory if the operator of the enrolment agency connives with someone. Since UIDAI allows enrolment of a person anywhere in the country by any enrolment agency, even if a few agencies get &quot;compromised&quot;, a large number of ineligible people can get entry into the UIDAI database, thereby gaining access to banking services and DBT facility.</p><p align="justify">Though TOI repeatedly contacted UIDAI officials for their version, they were not forthcoming with a response.</p><p align="justify">The UIDAI's risk assessment exercise, assisted by HCL, also recommended other security upgrades such as scanning of proof of identity and proof of address documents furnished by the Aadhar applicant at enrolment, and uploading them as part of the enrolment packet. This way the enrolment data could be matched with scanned documents during a subsequent quality check. Scanning, however, would mean a delay of few minutes per enrolment, besides additional costs and manpower. Though UIDAI got the estimated extra cost on scanning approved by the CC-UIDAI, even this feature was never activated.</p><p align="justify">Even the offline system that UIDAI settled for to collect proof or identity/address documents, followed by their scanning by a vendor-document management service (DMS), has been far from perfect. Not only was the DMS late in picking up documents from the enrolment agencies, but it was found in some cases that the agencies never collected the documents. There were also instances of documents not matching details of the Aadhar applicant, or being torn.</p><p align="justify">Experts cautioned such weaknesses could be exploited by the enrolment agencies to enroll residents without any document, including for a monetary consideration. The risk assessment team had warned that with the connivance of the operator, it is possible that biometrics of a foreign national are captured to generate Aadhaar number to a local resident to give him two Aadhar numbers and also capture mixed biometrics of more than one person for a single enrolment.</p><p align="justify">Also found prone to misuse was a software that allows biometric exception cases. Primarily meant for the physically challenged, it enables such persons to be enrolled without fingerprints or iris scan. It has come to the UIDAI's notice that a few unscrupulous operators have misused this feature to enroll able-bodied people without biometric data. This led UIDAI to intensify back-end checks, which led to large-scale rejection of enrolment packets.</p><p align="justify">Incidentally, the UIDAI has earlier rejected a home ministry suggestion for a security audit of Aadhar enrolment system.</p><p align="justify">Though UIDAI used to get demographic data verified manually by operators, this was discontinued in order to speed up Aadhar generation for DBT purposes. Even the feature of having government supervisors posted at each enrolment station was eased over time. First, the government supervisor was replaced by the enrolment agency's own supervisor, and then, one operator was allowed to become supervisor for another, defeating the purpose of having a supervisor.</p><p align="justify">&nbsp;</p>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 25521, 'title' => 'Aadhaar still rife with security flaws -Bharti Jain', 'subheading' => '', 'description' => '<div align="justify"> -The Times of India </div> <p align="justify"> <br /> <em>NEW DELHI: </em>In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside its defined territory, including foreign land, to enroll people and send data to UIDAI for processing. </p> <p align="justify"> The anomaly led a UIDAI committee, set up in the wake of the government's January 2012 direction to the authority to make its enrolment process more robust, to recommend installation of a GPS device in all enrolment devices. This would ensure that enrolment happened only within the geographical boundary of India and also in the states allocated to UIDAI. The cost of such device was covered in the revised cost estimates approved by the cabinet committee on UIDAI. However, the GPS feature was never implemented. </p> <p align="justify"> According to experts, non-enablement of GPS feature in the Aadhar enrolment device poses a security risk as it is possible to enroll people in non-Aadhar states as well as foreign territory if the operator of the enrolment agency connives with someone. Since UIDAI allows enrolment of a person anywhere in the country by any enrolment agency, even if a few agencies get &quot;compromised&quot;, a large number of ineligible people can get entry into the UIDAI database, thereby gaining access to banking services and DBT facility. </p> <p align="justify"> Though TOI repeatedly contacted UIDAI officials for their version, they were not forthcoming with a response. </p> <p align="justify"> The UIDAI's risk assessment exercise, assisted by HCL, also recommended other security upgrades such as scanning of proof of identity and proof of address documents furnished by the Aadhar applicant at enrolment, and uploading them as part of the enrolment packet. This way the enrolment data could be matched with scanned documents during a subsequent quality check. Scanning, however, would mean a delay of few minutes per enrolment, besides additional costs and manpower. Though UIDAI got the estimated extra cost on scanning approved by the CC-UIDAI, even this feature was never activated. </p> <p align="justify"> Even the offline system that UIDAI settled for to collect proof or identity/address documents, followed by their scanning by a vendor-document management service (DMS), has been far from perfect. Not only was the DMS late in picking up documents from the enrolment agencies, but it was found in some cases that the agencies never collected the documents. There were also instances of documents not matching details of the Aadhar applicant, or being torn. </p> <p align="justify"> Experts cautioned such weaknesses could be exploited by the enrolment agencies to enroll residents without any document, including for a monetary consideration. The risk assessment team had warned that with the connivance of the operator, it is possible that biometrics of a foreign national are captured to generate Aadhaar number to a local resident to give him two Aadhar numbers and also capture mixed biometrics of more than one person for a single enrolment. </p> <p align="justify"> Also found prone to misuse was a software that allows biometric exception cases. Primarily meant for the physically challenged, it enables such persons to be enrolled without fingerprints or iris scan. It has come to the UIDAI's notice that a few unscrupulous operators have misused this feature to enroll able-bodied people without biometric data. This led UIDAI to intensify back-end checks, which led to large-scale rejection of enrolment packets. </p> <p align="justify"> Incidentally, the UIDAI has earlier rejected a home ministry suggestion for a security audit of Aadhar enrolment system. </p> <p align="justify"> Though UIDAI used to get demographic data verified manually by operators, this was discontinued in order to speed up Aadhar generation for DBT purposes. Even the feature of having government supervisors posted at each enrolment station was eased over time. First, the government supervisor was replaced by the enrolment agency's own supervisor, and then, one operator was allowed to become supervisor for another, defeating the purpose of having a supervisor. </p> <p align="justify"> &nbsp; </p>', 'credit_writer' => 'The Times of India, 27 July, 2014, http://timesofindia.indiatimes.com/india/Aadhaar-still-rife-with-security-flaws/articleshow/39076802.cms', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'aadhaar-still-rife-with-security-flaws-bharti-jain-4673555', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 4673555, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 25521 $metaTitle = 'LATEST NEWS UPDATES | Aadhaar still rife with security flaws -Bharti Jain' $metaKeywords = 'aadhaar,UIDAI,uid' $metaDesc = ' -The Times of India NEW DELHI: In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside...' $disp = '<div align="justify">-The Times of India</div><p align="justify"><br /><em>NEW DELHI: </em>In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside its defined territory, including foreign land, to enroll people and send data to UIDAI for processing.</p><p align="justify">The anomaly led a UIDAI committee, set up in the wake of the government's January 2012 direction to the authority to make its enrolment process more robust, to recommend installation of a GPS device in all enrolment devices. This would ensure that enrolment happened only within the geographical boundary of India and also in the states allocated to UIDAI. The cost of such device was covered in the revised cost estimates approved by the cabinet committee on UIDAI. However, the GPS feature was never implemented.</p><p align="justify">According to experts, non-enablement of GPS feature in the Aadhar enrolment device poses a security risk as it is possible to enroll people in non-Aadhar states as well as foreign territory if the operator of the enrolment agency connives with someone. Since UIDAI allows enrolment of a person anywhere in the country by any enrolment agency, even if a few agencies get &quot;compromised&quot;, a large number of ineligible people can get entry into the UIDAI database, thereby gaining access to banking services and DBT facility.</p><p align="justify">Though TOI repeatedly contacted UIDAI officials for their version, they were not forthcoming with a response.</p><p align="justify">The UIDAI's risk assessment exercise, assisted by HCL, also recommended other security upgrades such as scanning of proof of identity and proof of address documents furnished by the Aadhar applicant at enrolment, and uploading them as part of the enrolment packet. This way the enrolment data could be matched with scanned documents during a subsequent quality check. Scanning, however, would mean a delay of few minutes per enrolment, besides additional costs and manpower. Though UIDAI got the estimated extra cost on scanning approved by the CC-UIDAI, even this feature was never activated.</p><p align="justify">Even the offline system that UIDAI settled for to collect proof or identity/address documents, followed by their scanning by a vendor-document management service (DMS), has been far from perfect. Not only was the DMS late in picking up documents from the enrolment agencies, but it was found in some cases that the agencies never collected the documents. There were also instances of documents not matching details of the Aadhar applicant, or being torn.</p><p align="justify">Experts cautioned such weaknesses could be exploited by the enrolment agencies to enroll residents without any document, including for a monetary consideration. The risk assessment team had warned that with the connivance of the operator, it is possible that biometrics of a foreign national are captured to generate Aadhaar number to a local resident to give him two Aadhar numbers and also capture mixed biometrics of more than one person for a single enrolment.</p><p align="justify">Also found prone to misuse was a software that allows biometric exception cases. Primarily meant for the physically challenged, it enables such persons to be enrolled without fingerprints or iris scan. It has come to the UIDAI's notice that a few unscrupulous operators have misused this feature to enroll able-bodied people without biometric data. This led UIDAI to intensify back-end checks, which led to large-scale rejection of enrolment packets.</p><p align="justify">Incidentally, the UIDAI has earlier rejected a home ministry suggestion for a security audit of Aadhar enrolment system.</p><p align="justify">Though UIDAI used to get demographic data verified manually by operators, this was discontinued in order to speed up Aadhar generation for DBT purposes. Even the feature of having government supervisors posted at each enrolment station was eased over time. First, the government supervisor was replaced by the enrolment agency's own supervisor, and then, one operator was allowed to become supervisor for another, defeating the purpose of having a supervisor.</p><p align="justify">&nbsp;</p>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/aadhaar-still-rife-with-security-flaws-bharti-jain-4673555.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | Aadhaar still rife with security flaws -Bharti Jain | Im4change.org</title> <meta name="description" content=" -The Times of India NEW DELHI: In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>Aadhaar still rife with security flaws -Bharti Jain</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <div align="justify">-The Times of India</div><p align="justify"><br /><em>NEW DELHI: </em>In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside its defined territory, including foreign land, to enroll people and send data to UIDAI for processing.</p><p align="justify">The anomaly led a UIDAI committee, set up in the wake of the government's January 2012 direction to the authority to make its enrolment process more robust, to recommend installation of a GPS device in all enrolment devices. This would ensure that enrolment happened only within the geographical boundary of India and also in the states allocated to UIDAI. The cost of such device was covered in the revised cost estimates approved by the cabinet committee on UIDAI. However, the GPS feature was never implemented.</p><p align="justify">According to experts, non-enablement of GPS feature in the Aadhar enrolment device poses a security risk as it is possible to enroll people in non-Aadhar states as well as foreign territory if the operator of the enrolment agency connives with someone. Since UIDAI allows enrolment of a person anywhere in the country by any enrolment agency, even if a few agencies get "compromised", a large number of ineligible people can get entry into the UIDAI database, thereby gaining access to banking services and DBT facility.</p><p align="justify">Though TOI repeatedly contacted UIDAI officials for their version, they were not forthcoming with a response.</p><p align="justify">The UIDAI's risk assessment exercise, assisted by HCL, also recommended other security upgrades such as scanning of proof of identity and proof of address documents furnished by the Aadhar applicant at enrolment, and uploading them as part of the enrolment packet. This way the enrolment data could be matched with scanned documents during a subsequent quality check. Scanning, however, would mean a delay of few minutes per enrolment, besides additional costs and manpower. Though UIDAI got the estimated extra cost on scanning approved by the CC-UIDAI, even this feature was never activated.</p><p align="justify">Even the offline system that UIDAI settled for to collect proof or identity/address documents, followed by their scanning by a vendor-document management service (DMS), has been far from perfect. Not only was the DMS late in picking up documents from the enrolment agencies, but it was found in some cases that the agencies never collected the documents. There were also instances of documents not matching details of the Aadhar applicant, or being torn.</p><p align="justify">Experts cautioned such weaknesses could be exploited by the enrolment agencies to enroll residents without any document, including for a monetary consideration. The risk assessment team had warned that with the connivance of the operator, it is possible that biometrics of a foreign national are captured to generate Aadhaar number to a local resident to give him two Aadhar numbers and also capture mixed biometrics of more than one person for a single enrolment.</p><p align="justify">Also found prone to misuse was a software that allows biometric exception cases. Primarily meant for the physically challenged, it enables such persons to be enrolled without fingerprints or iris scan. It has come to the UIDAI's notice that a few unscrupulous operators have misused this feature to enroll able-bodied people without biometric data. This led UIDAI to intensify back-end checks, which led to large-scale rejection of enrolment packets.</p><p align="justify">Incidentally, the UIDAI has earlier rejected a home ministry suggestion for a security audit of Aadhar enrolment system.</p><p align="justify">Though UIDAI used to get demographic data verified manually by operators, this was discontinued in order to speed up Aadhar generation for DBT purposes. Even the feature of having government supervisors posted at each enrolment station was eased over time. First, the government supervisor was replaced by the enrolment agency's own supervisor, and then, one operator was allowed to become supervisor for another, defeating the purpose of having a supervisor.</p><p align="justify"> </p> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $maxBufferLength = (int) 8192 $file = '/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php' $line = (int) 853 $message = 'Unable to emit headers. Headers sent in file=/home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php line=853'Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 48 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
Warning (2): Cannot modify header information - headers already sent by (output started at /home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php:853) [CORE/src/Http/ResponseEmitter.php, line 148]Code Context$response->getStatusCode(),
($reasonPhrase ? ' ' . $reasonPhrase : '')
));
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr68049506971e2-trace').style.display = (document.getElementById('cakeErr68049506971e2-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr68049506971e2-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr68049506971e2-code').style.display = (document.getElementById('cakeErr68049506971e2-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr68049506971e2-context').style.display = (document.getElementById('cakeErr68049506971e2-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr68049506971e2-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr68049506971e2-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 25521, 'title' => 'Aadhaar still rife with security flaws -Bharti Jain', 'subheading' => '', 'description' => '<div align="justify"> -The Times of India </div> <p align="justify"> <br /> <em>NEW DELHI: </em>In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside its defined territory, including foreign land, to enroll people and send data to UIDAI for processing. </p> <p align="justify"> The anomaly led a UIDAI committee, set up in the wake of the government's January 2012 direction to the authority to make its enrolment process more robust, to recommend installation of a GPS device in all enrolment devices. This would ensure that enrolment happened only within the geographical boundary of India and also in the states allocated to UIDAI. The cost of such device was covered in the revised cost estimates approved by the cabinet committee on UIDAI. However, the GPS feature was never implemented. </p> <p align="justify"> According to experts, non-enablement of GPS feature in the Aadhar enrolment device poses a security risk as it is possible to enroll people in non-Aadhar states as well as foreign territory if the operator of the enrolment agency connives with someone. Since UIDAI allows enrolment of a person anywhere in the country by any enrolment agency, even if a few agencies get &quot;compromised&quot;, a large number of ineligible people can get entry into the UIDAI database, thereby gaining access to banking services and DBT facility. </p> <p align="justify"> Though TOI repeatedly contacted UIDAI officials for their version, they were not forthcoming with a response. </p> <p align="justify"> The UIDAI's risk assessment exercise, assisted by HCL, also recommended other security upgrades such as scanning of proof of identity and proof of address documents furnished by the Aadhar applicant at enrolment, and uploading them as part of the enrolment packet. This way the enrolment data could be matched with scanned documents during a subsequent quality check. Scanning, however, would mean a delay of few minutes per enrolment, besides additional costs and manpower. Though UIDAI got the estimated extra cost on scanning approved by the CC-UIDAI, even this feature was never activated. </p> <p align="justify"> Even the offline system that UIDAI settled for to collect proof or identity/address documents, followed by their scanning by a vendor-document management service (DMS), has been far from perfect. Not only was the DMS late in picking up documents from the enrolment agencies, but it was found in some cases that the agencies never collected the documents. There were also instances of documents not matching details of the Aadhar applicant, or being torn. </p> <p align="justify"> Experts cautioned such weaknesses could be exploited by the enrolment agencies to enroll residents without any document, including for a monetary consideration. The risk assessment team had warned that with the connivance of the operator, it is possible that biometrics of a foreign national are captured to generate Aadhaar number to a local resident to give him two Aadhar numbers and also capture mixed biometrics of more than one person for a single enrolment. </p> <p align="justify"> Also found prone to misuse was a software that allows biometric exception cases. Primarily meant for the physically challenged, it enables such persons to be enrolled without fingerprints or iris scan. It has come to the UIDAI's notice that a few unscrupulous operators have misused this feature to enroll able-bodied people without biometric data. This led UIDAI to intensify back-end checks, which led to large-scale rejection of enrolment packets. </p> <p align="justify"> Incidentally, the UIDAI has earlier rejected a home ministry suggestion for a security audit of Aadhar enrolment system. </p> <p align="justify"> Though UIDAI used to get demographic data verified manually by operators, this was discontinued in order to speed up Aadhar generation for DBT purposes. Even the feature of having government supervisors posted at each enrolment station was eased over time. First, the government supervisor was replaced by the enrolment agency's own supervisor, and then, one operator was allowed to become supervisor for another, defeating the purpose of having a supervisor. </p> <p align="justify"> &nbsp; </p>', 'credit_writer' => 'The Times of India, 27 July, 2014, http://timesofindia.indiatimes.com/india/Aadhaar-still-rife-with-security-flaws/articleshow/39076802.cms', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'aadhaar-still-rife-with-security-flaws-bharti-jain-4673555', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 4673555, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 25521, 'metaTitle' => 'LATEST NEWS UPDATES | Aadhaar still rife with security flaws -Bharti Jain', 'metaKeywords' => 'aadhaar,UIDAI,uid', 'metaDesc' => ' -The Times of India NEW DELHI: In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside...', 'disp' => '<div align="justify">-The Times of India</div><p align="justify"><br /><em>NEW DELHI: </em>In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside its defined territory, including foreign land, to enroll people and send data to UIDAI for processing.</p><p align="justify">The anomaly led a UIDAI committee, set up in the wake of the government's January 2012 direction to the authority to make its enrolment process more robust, to recommend installation of a GPS device in all enrolment devices. This would ensure that enrolment happened only within the geographical boundary of India and also in the states allocated to UIDAI. The cost of such device was covered in the revised cost estimates approved by the cabinet committee on UIDAI. However, the GPS feature was never implemented.</p><p align="justify">According to experts, non-enablement of GPS feature in the Aadhar enrolment device poses a security risk as it is possible to enroll people in non-Aadhar states as well as foreign territory if the operator of the enrolment agency connives with someone. Since UIDAI allows enrolment of a person anywhere in the country by any enrolment agency, even if a few agencies get &quot;compromised&quot;, a large number of ineligible people can get entry into the UIDAI database, thereby gaining access to banking services and DBT facility.</p><p align="justify">Though TOI repeatedly contacted UIDAI officials for their version, they were not forthcoming with a response.</p><p align="justify">The UIDAI's risk assessment exercise, assisted by HCL, also recommended other security upgrades such as scanning of proof of identity and proof of address documents furnished by the Aadhar applicant at enrolment, and uploading them as part of the enrolment packet. This way the enrolment data could be matched with scanned documents during a subsequent quality check. Scanning, however, would mean a delay of few minutes per enrolment, besides additional costs and manpower. Though UIDAI got the estimated extra cost on scanning approved by the CC-UIDAI, even this feature was never activated.</p><p align="justify">Even the offline system that UIDAI settled for to collect proof or identity/address documents, followed by their scanning by a vendor-document management service (DMS), has been far from perfect. Not only was the DMS late in picking up documents from the enrolment agencies, but it was found in some cases that the agencies never collected the documents. There were also instances of documents not matching details of the Aadhar applicant, or being torn.</p><p align="justify">Experts cautioned such weaknesses could be exploited by the enrolment agencies to enroll residents without any document, including for a monetary consideration. The risk assessment team had warned that with the connivance of the operator, it is possible that biometrics of a foreign national are captured to generate Aadhaar number to a local resident to give him two Aadhar numbers and also capture mixed biometrics of more than one person for a single enrolment.</p><p align="justify">Also found prone to misuse was a software that allows biometric exception cases. Primarily meant for the physically challenged, it enables such persons to be enrolled without fingerprints or iris scan. It has come to the UIDAI's notice that a few unscrupulous operators have misused this feature to enroll able-bodied people without biometric data. This led UIDAI to intensify back-end checks, which led to large-scale rejection of enrolment packets.</p><p align="justify">Incidentally, the UIDAI has earlier rejected a home ministry suggestion for a security audit of Aadhar enrolment system.</p><p align="justify">Though UIDAI used to get demographic data verified manually by operators, this was discontinued in order to speed up Aadhar generation for DBT purposes. Even the feature of having government supervisors posted at each enrolment station was eased over time. First, the government supervisor was replaced by the enrolment agency's own supervisor, and then, one operator was allowed to become supervisor for another, defeating the purpose of having a supervisor.</p><p align="justify">&nbsp;</p>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 25521, 'title' => 'Aadhaar still rife with security flaws -Bharti Jain', 'subheading' => '', 'description' => '<div align="justify"> -The Times of India </div> <p align="justify"> <br /> <em>NEW DELHI: </em>In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside its defined territory, including foreign land, to enroll people and send data to UIDAI for processing. </p> <p align="justify"> The anomaly led a UIDAI committee, set up in the wake of the government's January 2012 direction to the authority to make its enrolment process more robust, to recommend installation of a GPS device in all enrolment devices. This would ensure that enrolment happened only within the geographical boundary of India and also in the states allocated to UIDAI. The cost of such device was covered in the revised cost estimates approved by the cabinet committee on UIDAI. However, the GPS feature was never implemented. </p> <p align="justify"> According to experts, non-enablement of GPS feature in the Aadhar enrolment device poses a security risk as it is possible to enroll people in non-Aadhar states as well as foreign territory if the operator of the enrolment agency connives with someone. Since UIDAI allows enrolment of a person anywhere in the country by any enrolment agency, even if a few agencies get &quot;compromised&quot;, a large number of ineligible people can get entry into the UIDAI database, thereby gaining access to banking services and DBT facility. </p> <p align="justify"> Though TOI repeatedly contacted UIDAI officials for their version, they were not forthcoming with a response. </p> <p align="justify"> The UIDAI's risk assessment exercise, assisted by HCL, also recommended other security upgrades such as scanning of proof of identity and proof of address documents furnished by the Aadhar applicant at enrolment, and uploading them as part of the enrolment packet. This way the enrolment data could be matched with scanned documents during a subsequent quality check. Scanning, however, would mean a delay of few minutes per enrolment, besides additional costs and manpower. Though UIDAI got the estimated extra cost on scanning approved by the CC-UIDAI, even this feature was never activated. </p> <p align="justify"> Even the offline system that UIDAI settled for to collect proof or identity/address documents, followed by their scanning by a vendor-document management service (DMS), has been far from perfect. Not only was the DMS late in picking up documents from the enrolment agencies, but it was found in some cases that the agencies never collected the documents. There were also instances of documents not matching details of the Aadhar applicant, or being torn. </p> <p align="justify"> Experts cautioned such weaknesses could be exploited by the enrolment agencies to enroll residents without any document, including for a monetary consideration. The risk assessment team had warned that with the connivance of the operator, it is possible that biometrics of a foreign national are captured to generate Aadhaar number to a local resident to give him two Aadhar numbers and also capture mixed biometrics of more than one person for a single enrolment. </p> <p align="justify"> Also found prone to misuse was a software that allows biometric exception cases. Primarily meant for the physically challenged, it enables such persons to be enrolled without fingerprints or iris scan. It has come to the UIDAI's notice that a few unscrupulous operators have misused this feature to enroll able-bodied people without biometric data. This led UIDAI to intensify back-end checks, which led to large-scale rejection of enrolment packets. </p> <p align="justify"> Incidentally, the UIDAI has earlier rejected a home ministry suggestion for a security audit of Aadhar enrolment system. </p> <p align="justify"> Though UIDAI used to get demographic data verified manually by operators, this was discontinued in order to speed up Aadhar generation for DBT purposes. Even the feature of having government supervisors posted at each enrolment station was eased over time. First, the government supervisor was replaced by the enrolment agency's own supervisor, and then, one operator was allowed to become supervisor for another, defeating the purpose of having a supervisor. </p> <p align="justify"> &nbsp; </p>', 'credit_writer' => 'The Times of India, 27 July, 2014, http://timesofindia.indiatimes.com/india/Aadhaar-still-rife-with-security-flaws/articleshow/39076802.cms', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'aadhaar-still-rife-with-security-flaws-bharti-jain-4673555', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 4673555, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 25521 $metaTitle = 'LATEST NEWS UPDATES | Aadhaar still rife with security flaws -Bharti Jain' $metaKeywords = 'aadhaar,UIDAI,uid' $metaDesc = ' -The Times of India NEW DELHI: In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside...' $disp = '<div align="justify">-The Times of India</div><p align="justify"><br /><em>NEW DELHI: </em>In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside its defined territory, including foreign land, to enroll people and send data to UIDAI for processing.</p><p align="justify">The anomaly led a UIDAI committee, set up in the wake of the government's January 2012 direction to the authority to make its enrolment process more robust, to recommend installation of a GPS device in all enrolment devices. This would ensure that enrolment happened only within the geographical boundary of India and also in the states allocated to UIDAI. The cost of such device was covered in the revised cost estimates approved by the cabinet committee on UIDAI. However, the GPS feature was never implemented.</p><p align="justify">According to experts, non-enablement of GPS feature in the Aadhar enrolment device poses a security risk as it is possible to enroll people in non-Aadhar states as well as foreign territory if the operator of the enrolment agency connives with someone. Since UIDAI allows enrolment of a person anywhere in the country by any enrolment agency, even if a few agencies get &quot;compromised&quot;, a large number of ineligible people can get entry into the UIDAI database, thereby gaining access to banking services and DBT facility.</p><p align="justify">Though TOI repeatedly contacted UIDAI officials for their version, they were not forthcoming with a response.</p><p align="justify">The UIDAI's risk assessment exercise, assisted by HCL, also recommended other security upgrades such as scanning of proof of identity and proof of address documents furnished by the Aadhar applicant at enrolment, and uploading them as part of the enrolment packet. This way the enrolment data could be matched with scanned documents during a subsequent quality check. Scanning, however, would mean a delay of few minutes per enrolment, besides additional costs and manpower. Though UIDAI got the estimated extra cost on scanning approved by the CC-UIDAI, even this feature was never activated.</p><p align="justify">Even the offline system that UIDAI settled for to collect proof or identity/address documents, followed by their scanning by a vendor-document management service (DMS), has been far from perfect. Not only was the DMS late in picking up documents from the enrolment agencies, but it was found in some cases that the agencies never collected the documents. There were also instances of documents not matching details of the Aadhar applicant, or being torn.</p><p align="justify">Experts cautioned such weaknesses could be exploited by the enrolment agencies to enroll residents without any document, including for a monetary consideration. The risk assessment team had warned that with the connivance of the operator, it is possible that biometrics of a foreign national are captured to generate Aadhaar number to a local resident to give him two Aadhar numbers and also capture mixed biometrics of more than one person for a single enrolment.</p><p align="justify">Also found prone to misuse was a software that allows biometric exception cases. Primarily meant for the physically challenged, it enables such persons to be enrolled without fingerprints or iris scan. It has come to the UIDAI's notice that a few unscrupulous operators have misused this feature to enroll able-bodied people without biometric data. This led UIDAI to intensify back-end checks, which led to large-scale rejection of enrolment packets.</p><p align="justify">Incidentally, the UIDAI has earlier rejected a home ministry suggestion for a security audit of Aadhar enrolment system.</p><p align="justify">Though UIDAI used to get demographic data verified manually by operators, this was discontinued in order to speed up Aadhar generation for DBT purposes. Even the feature of having government supervisors posted at each enrolment station was eased over time. First, the government supervisor was replaced by the enrolment agency's own supervisor, and then, one operator was allowed to become supervisor for another, defeating the purpose of having a supervisor.</p><p align="justify">&nbsp;</p>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/aadhaar-still-rife-with-security-flaws-bharti-jain-4673555.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | Aadhaar still rife with security flaws -Bharti Jain | Im4change.org</title> <meta name="description" content=" -The Times of India NEW DELHI: In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>Aadhaar still rife with security flaws -Bharti Jain</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <div align="justify">-The Times of India</div><p align="justify"><br /><em>NEW DELHI: </em>In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside its defined territory, including foreign land, to enroll people and send data to UIDAI for processing.</p><p align="justify">The anomaly led a UIDAI committee, set up in the wake of the government's January 2012 direction to the authority to make its enrolment process more robust, to recommend installation of a GPS device in all enrolment devices. This would ensure that enrolment happened only within the geographical boundary of India and also in the states allocated to UIDAI. The cost of such device was covered in the revised cost estimates approved by the cabinet committee on UIDAI. However, the GPS feature was never implemented.</p><p align="justify">According to experts, non-enablement of GPS feature in the Aadhar enrolment device poses a security risk as it is possible to enroll people in non-Aadhar states as well as foreign territory if the operator of the enrolment agency connives with someone. Since UIDAI allows enrolment of a person anywhere in the country by any enrolment agency, even if a few agencies get "compromised", a large number of ineligible people can get entry into the UIDAI database, thereby gaining access to banking services and DBT facility.</p><p align="justify">Though TOI repeatedly contacted UIDAI officials for their version, they were not forthcoming with a response.</p><p align="justify">The UIDAI's risk assessment exercise, assisted by HCL, also recommended other security upgrades such as scanning of proof of identity and proof of address documents furnished by the Aadhar applicant at enrolment, and uploading them as part of the enrolment packet. This way the enrolment data could be matched with scanned documents during a subsequent quality check. Scanning, however, would mean a delay of few minutes per enrolment, besides additional costs and manpower. Though UIDAI got the estimated extra cost on scanning approved by the CC-UIDAI, even this feature was never activated.</p><p align="justify">Even the offline system that UIDAI settled for to collect proof or identity/address documents, followed by their scanning by a vendor-document management service (DMS), has been far from perfect. Not only was the DMS late in picking up documents from the enrolment agencies, but it was found in some cases that the agencies never collected the documents. There were also instances of documents not matching details of the Aadhar applicant, or being torn.</p><p align="justify">Experts cautioned such weaknesses could be exploited by the enrolment agencies to enroll residents without any document, including for a monetary consideration. The risk assessment team had warned that with the connivance of the operator, it is possible that biometrics of a foreign national are captured to generate Aadhaar number to a local resident to give him two Aadhar numbers and also capture mixed biometrics of more than one person for a single enrolment.</p><p align="justify">Also found prone to misuse was a software that allows biometric exception cases. Primarily meant for the physically challenged, it enables such persons to be enrolled without fingerprints or iris scan. It has come to the UIDAI's notice that a few unscrupulous operators have misused this feature to enroll able-bodied people without biometric data. This led UIDAI to intensify back-end checks, which led to large-scale rejection of enrolment packets.</p><p align="justify">Incidentally, the UIDAI has earlier rejected a home ministry suggestion for a security audit of Aadhar enrolment system.</p><p align="justify">Though UIDAI used to get demographic data verified manually by operators, this was discontinued in order to speed up Aadhar generation for DBT purposes. Even the feature of having government supervisors posted at each enrolment station was eased over time. First, the government supervisor was replaced by the enrolment agency's own supervisor, and then, one operator was allowed to become supervisor for another, defeating the purpose of having a supervisor.</p><p align="justify"> </p> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $reasonPhrase = 'OK'header - [internal], line ?? Cake\Http\ResponseEmitter::emitStatusLine() - CORE/src/Http/ResponseEmitter.php, line 148 Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 54 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
Warning (2): Cannot modify header information - headers already sent by (output started at /home/brlfuser/public_html/vendor/cakephp/cakephp/src/Error/Debugger.php:853) [CORE/src/Http/ResponseEmitter.php, line 181]Notice (8): Undefined variable: urlPrefix [APP/Template/Layout/printlayout.ctp, line 8]Code Context$value
), $first);
$first = false;
$response = object(Cake\Http\Response) { 'status' => (int) 200, 'contentType' => 'text/html', 'headers' => [ 'Content-Type' => [ [maximum depth reached] ] ], 'file' => null, 'fileRange' => [], 'cookies' => object(Cake\Http\Cookie\CookieCollection) {}, 'cacheDirectives' => [], 'body' => '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <link rel="canonical" href="https://im4change.in/<pre class="cake-error"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr68049506971e2-trace').style.display = (document.getElementById('cakeErr68049506971e2-trace').style.display == 'none' ? '' : 'none');"><b>Notice</b> (8)</a>: Undefined variable: urlPrefix [<b>APP/Template/Layout/printlayout.ctp</b>, line <b>8</b>]<div id="cakeErr68049506971e2-trace" class="cake-stack-trace" style="display: none;"><a href="javascript:void(0);" onclick="document.getElementById('cakeErr68049506971e2-code').style.display = (document.getElementById('cakeErr68049506971e2-code').style.display == 'none' ? '' : 'none')">Code</a> <a href="javascript:void(0);" onclick="document.getElementById('cakeErr68049506971e2-context').style.display = (document.getElementById('cakeErr68049506971e2-context').style.display == 'none' ? '' : 'none')">Context</a><pre id="cakeErr68049506971e2-code" class="cake-code-dump" style="display: none;"><code><span style="color: #000000"><span style="color: #0000BB"></span><span style="color: #007700"><</span><span style="color: #0000BB">head</span><span style="color: #007700">> </span></span></code> <span class="code-highlight"><code><span style="color: #000000"> <link rel="canonical" href="<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">Configure</span><span style="color: #007700">::</span><span style="color: #0000BB">read</span><span style="color: #007700">(</span><span style="color: #DD0000">'SITE_URL'</span><span style="color: #007700">); </span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$urlPrefix</span><span style="color: #007700">;</span><span style="color: #0000BB">?><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">category</span><span style="color: #007700">-></span><span style="color: #0000BB">slug</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>/<span style="color: #0000BB"><?php </span><span style="color: #007700">echo </span><span style="color: #0000BB">$article_current</span><span style="color: #007700">-></span><span style="color: #0000BB">seo_url</span><span style="color: #007700">; </span><span style="color: #0000BB">?></span>.html"/> </span></code></span> <code><span style="color: #000000"><span style="color: #0000BB"> </span><span style="color: #007700"><</span><span style="color: #0000BB">meta http</span><span style="color: #007700">-</span><span style="color: #0000BB">equiv</span><span style="color: #007700">=</span><span style="color: #DD0000">"Content-Type" </span><span style="color: #0000BB">content</span><span style="color: #007700">=</span><span style="color: #DD0000">"text/html; charset=utf-8"</span><span style="color: #007700">/> </span></span></code></pre><pre id="cakeErr68049506971e2-context" class="cake-context" style="display: none;">$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 25521, 'title' => 'Aadhaar still rife with security flaws -Bharti Jain', 'subheading' => '', 'description' => '<div align="justify"> -The Times of India </div> <p align="justify"> <br /> <em>NEW DELHI: </em>In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside its defined territory, including foreign land, to enroll people and send data to UIDAI for processing. </p> <p align="justify"> The anomaly led a UIDAI committee, set up in the wake of the government's January 2012 direction to the authority to make its enrolment process more robust, to recommend installation of a GPS device in all enrolment devices. This would ensure that enrolment happened only within the geographical boundary of India and also in the states allocated to UIDAI. The cost of such device was covered in the revised cost estimates approved by the cabinet committee on UIDAI. However, the GPS feature was never implemented. </p> <p align="justify"> According to experts, non-enablement of GPS feature in the Aadhar enrolment device poses a security risk as it is possible to enroll people in non-Aadhar states as well as foreign territory if the operator of the enrolment agency connives with someone. Since UIDAI allows enrolment of a person anywhere in the country by any enrolment agency, even if a few agencies get &quot;compromised&quot;, a large number of ineligible people can get entry into the UIDAI database, thereby gaining access to banking services and DBT facility. </p> <p align="justify"> Though TOI repeatedly contacted UIDAI officials for their version, they were not forthcoming with a response. </p> <p align="justify"> The UIDAI's risk assessment exercise, assisted by HCL, also recommended other security upgrades such as scanning of proof of identity and proof of address documents furnished by the Aadhar applicant at enrolment, and uploading them as part of the enrolment packet. This way the enrolment data could be matched with scanned documents during a subsequent quality check. Scanning, however, would mean a delay of few minutes per enrolment, besides additional costs and manpower. Though UIDAI got the estimated extra cost on scanning approved by the CC-UIDAI, even this feature was never activated. </p> <p align="justify"> Even the offline system that UIDAI settled for to collect proof or identity/address documents, followed by their scanning by a vendor-document management service (DMS), has been far from perfect. Not only was the DMS late in picking up documents from the enrolment agencies, but it was found in some cases that the agencies never collected the documents. There were also instances of documents not matching details of the Aadhar applicant, or being torn. </p> <p align="justify"> Experts cautioned such weaknesses could be exploited by the enrolment agencies to enroll residents without any document, including for a monetary consideration. The risk assessment team had warned that with the connivance of the operator, it is possible that biometrics of a foreign national are captured to generate Aadhaar number to a local resident to give him two Aadhar numbers and also capture mixed biometrics of more than one person for a single enrolment. </p> <p align="justify"> Also found prone to misuse was a software that allows biometric exception cases. Primarily meant for the physically challenged, it enables such persons to be enrolled without fingerprints or iris scan. It has come to the UIDAI's notice that a few unscrupulous operators have misused this feature to enroll able-bodied people without biometric data. This led UIDAI to intensify back-end checks, which led to large-scale rejection of enrolment packets. </p> <p align="justify"> Incidentally, the UIDAI has earlier rejected a home ministry suggestion for a security audit of Aadhar enrolment system. </p> <p align="justify"> Though UIDAI used to get demographic data verified manually by operators, this was discontinued in order to speed up Aadhar generation for DBT purposes. Even the feature of having government supervisors posted at each enrolment station was eased over time. First, the government supervisor was replaced by the enrolment agency's own supervisor, and then, one operator was allowed to become supervisor for another, defeating the purpose of having a supervisor. </p> <p align="justify"> &nbsp; </p>', 'credit_writer' => 'The Times of India, 27 July, 2014, http://timesofindia.indiatimes.com/india/Aadhaar-still-rife-with-security-flaws/articleshow/39076802.cms', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'aadhaar-still-rife-with-security-flaws-bharti-jain-4673555', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 4673555, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 25521, 'metaTitle' => 'LATEST NEWS UPDATES | Aadhaar still rife with security flaws -Bharti Jain', 'metaKeywords' => 'aadhaar,UIDAI,uid', 'metaDesc' => ' -The Times of India NEW DELHI: In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside...', 'disp' => '<div align="justify">-The Times of India</div><p align="justify"><br /><em>NEW DELHI: </em>In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside its defined territory, including foreign land, to enroll people and send data to UIDAI for processing.</p><p align="justify">The anomaly led a UIDAI committee, set up in the wake of the government's January 2012 direction to the authority to make its enrolment process more robust, to recommend installation of a GPS device in all enrolment devices. This would ensure that enrolment happened only within the geographical boundary of India and also in the states allocated to UIDAI. The cost of such device was covered in the revised cost estimates approved by the cabinet committee on UIDAI. However, the GPS feature was never implemented.</p><p align="justify">According to experts, non-enablement of GPS feature in the Aadhar enrolment device poses a security risk as it is possible to enroll people in non-Aadhar states as well as foreign territory if the operator of the enrolment agency connives with someone. Since UIDAI allows enrolment of a person anywhere in the country by any enrolment agency, even if a few agencies get &quot;compromised&quot;, a large number of ineligible people can get entry into the UIDAI database, thereby gaining access to banking services and DBT facility.</p><p align="justify">Though TOI repeatedly contacted UIDAI officials for their version, they were not forthcoming with a response.</p><p align="justify">The UIDAI's risk assessment exercise, assisted by HCL, also recommended other security upgrades such as scanning of proof of identity and proof of address documents furnished by the Aadhar applicant at enrolment, and uploading them as part of the enrolment packet. This way the enrolment data could be matched with scanned documents during a subsequent quality check. Scanning, however, would mean a delay of few minutes per enrolment, besides additional costs and manpower. Though UIDAI got the estimated extra cost on scanning approved by the CC-UIDAI, even this feature was never activated.</p><p align="justify">Even the offline system that UIDAI settled for to collect proof or identity/address documents, followed by their scanning by a vendor-document management service (DMS), has been far from perfect. Not only was the DMS late in picking up documents from the enrolment agencies, but it was found in some cases that the agencies never collected the documents. There were also instances of documents not matching details of the Aadhar applicant, or being torn.</p><p align="justify">Experts cautioned such weaknesses could be exploited by the enrolment agencies to enroll residents without any document, including for a monetary consideration. The risk assessment team had warned that with the connivance of the operator, it is possible that biometrics of a foreign national are captured to generate Aadhaar number to a local resident to give him two Aadhar numbers and also capture mixed biometrics of more than one person for a single enrolment.</p><p align="justify">Also found prone to misuse was a software that allows biometric exception cases. Primarily meant for the physically challenged, it enables such persons to be enrolled without fingerprints or iris scan. It has come to the UIDAI's notice that a few unscrupulous operators have misused this feature to enroll able-bodied people without biometric data. This led UIDAI to intensify back-end checks, which led to large-scale rejection of enrolment packets.</p><p align="justify">Incidentally, the UIDAI has earlier rejected a home ministry suggestion for a security audit of Aadhar enrolment system.</p><p align="justify">Though UIDAI used to get demographic data verified manually by operators, this was discontinued in order to speed up Aadhar generation for DBT purposes. Even the feature of having government supervisors posted at each enrolment station was eased over time. First, the government supervisor was replaced by the enrolment agency's own supervisor, and then, one operator was allowed to become supervisor for another, defeating the purpose of having a supervisor.</p><p align="justify">&nbsp;</p>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 25521, 'title' => 'Aadhaar still rife with security flaws -Bharti Jain', 'subheading' => '', 'description' => '<div align="justify"> -The Times of India </div> <p align="justify"> <br /> <em>NEW DELHI: </em>In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside its defined territory, including foreign land, to enroll people and send data to UIDAI for processing. </p> <p align="justify"> The anomaly led a UIDAI committee, set up in the wake of the government's January 2012 direction to the authority to make its enrolment process more robust, to recommend installation of a GPS device in all enrolment devices. This would ensure that enrolment happened only within the geographical boundary of India and also in the states allocated to UIDAI. The cost of such device was covered in the revised cost estimates approved by the cabinet committee on UIDAI. However, the GPS feature was never implemented. </p> <p align="justify"> According to experts, non-enablement of GPS feature in the Aadhar enrolment device poses a security risk as it is possible to enroll people in non-Aadhar states as well as foreign territory if the operator of the enrolment agency connives with someone. Since UIDAI allows enrolment of a person anywhere in the country by any enrolment agency, even if a few agencies get &quot;compromised&quot;, a large number of ineligible people can get entry into the UIDAI database, thereby gaining access to banking services and DBT facility. </p> <p align="justify"> Though TOI repeatedly contacted UIDAI officials for their version, they were not forthcoming with a response. </p> <p align="justify"> The UIDAI's risk assessment exercise, assisted by HCL, also recommended other security upgrades such as scanning of proof of identity and proof of address documents furnished by the Aadhar applicant at enrolment, and uploading them as part of the enrolment packet. This way the enrolment data could be matched with scanned documents during a subsequent quality check. Scanning, however, would mean a delay of few minutes per enrolment, besides additional costs and manpower. Though UIDAI got the estimated extra cost on scanning approved by the CC-UIDAI, even this feature was never activated. </p> <p align="justify"> Even the offline system that UIDAI settled for to collect proof or identity/address documents, followed by their scanning by a vendor-document management service (DMS), has been far from perfect. Not only was the DMS late in picking up documents from the enrolment agencies, but it was found in some cases that the agencies never collected the documents. There were also instances of documents not matching details of the Aadhar applicant, or being torn. </p> <p align="justify"> Experts cautioned such weaknesses could be exploited by the enrolment agencies to enroll residents without any document, including for a monetary consideration. The risk assessment team had warned that with the connivance of the operator, it is possible that biometrics of a foreign national are captured to generate Aadhaar number to a local resident to give him two Aadhar numbers and also capture mixed biometrics of more than one person for a single enrolment. </p> <p align="justify"> Also found prone to misuse was a software that allows biometric exception cases. Primarily meant for the physically challenged, it enables such persons to be enrolled without fingerprints or iris scan. It has come to the UIDAI's notice that a few unscrupulous operators have misused this feature to enroll able-bodied people without biometric data. This led UIDAI to intensify back-end checks, which led to large-scale rejection of enrolment packets. </p> <p align="justify"> Incidentally, the UIDAI has earlier rejected a home ministry suggestion for a security audit of Aadhar enrolment system. </p> <p align="justify"> Though UIDAI used to get demographic data verified manually by operators, this was discontinued in order to speed up Aadhar generation for DBT purposes. Even the feature of having government supervisors posted at each enrolment station was eased over time. First, the government supervisor was replaced by the enrolment agency's own supervisor, and then, one operator was allowed to become supervisor for another, defeating the purpose of having a supervisor. </p> <p align="justify"> &nbsp; </p>', 'credit_writer' => 'The Times of India, 27 July, 2014, http://timesofindia.indiatimes.com/india/Aadhaar-still-rife-with-security-flaws/articleshow/39076802.cms', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'aadhaar-still-rife-with-security-flaws-bharti-jain-4673555', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 4673555, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 25521 $metaTitle = 'LATEST NEWS UPDATES | Aadhaar still rife with security flaws -Bharti Jain' $metaKeywords = 'aadhaar,UIDAI,uid' $metaDesc = ' -The Times of India NEW DELHI: In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside...' $disp = '<div align="justify">-The Times of India</div><p align="justify"><br /><em>NEW DELHI: </em>In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside its defined territory, including foreign land, to enroll people and send data to UIDAI for processing.</p><p align="justify">The anomaly led a UIDAI committee, set up in the wake of the government's January 2012 direction to the authority to make its enrolment process more robust, to recommend installation of a GPS device in all enrolment devices. This would ensure that enrolment happened only within the geographical boundary of India and also in the states allocated to UIDAI. The cost of such device was covered in the revised cost estimates approved by the cabinet committee on UIDAI. However, the GPS feature was never implemented.</p><p align="justify">According to experts, non-enablement of GPS feature in the Aadhar enrolment device poses a security risk as it is possible to enroll people in non-Aadhar states as well as foreign territory if the operator of the enrolment agency connives with someone. Since UIDAI allows enrolment of a person anywhere in the country by any enrolment agency, even if a few agencies get &quot;compromised&quot;, a large number of ineligible people can get entry into the UIDAI database, thereby gaining access to banking services and DBT facility.</p><p align="justify">Though TOI repeatedly contacted UIDAI officials for their version, they were not forthcoming with a response.</p><p align="justify">The UIDAI's risk assessment exercise, assisted by HCL, also recommended other security upgrades such as scanning of proof of identity and proof of address documents furnished by the Aadhar applicant at enrolment, and uploading them as part of the enrolment packet. This way the enrolment data could be matched with scanned documents during a subsequent quality check. Scanning, however, would mean a delay of few minutes per enrolment, besides additional costs and manpower. Though UIDAI got the estimated extra cost on scanning approved by the CC-UIDAI, even this feature was never activated.</p><p align="justify">Even the offline system that UIDAI settled for to collect proof or identity/address documents, followed by their scanning by a vendor-document management service (DMS), has been far from perfect. Not only was the DMS late in picking up documents from the enrolment agencies, but it was found in some cases that the agencies never collected the documents. There were also instances of documents not matching details of the Aadhar applicant, or being torn.</p><p align="justify">Experts cautioned such weaknesses could be exploited by the enrolment agencies to enroll residents without any document, including for a monetary consideration. The risk assessment team had warned that with the connivance of the operator, it is possible that biometrics of a foreign national are captured to generate Aadhaar number to a local resident to give him two Aadhar numbers and also capture mixed biometrics of more than one person for a single enrolment.</p><p align="justify">Also found prone to misuse was a software that allows biometric exception cases. Primarily meant for the physically challenged, it enables such persons to be enrolled without fingerprints or iris scan. It has come to the UIDAI's notice that a few unscrupulous operators have misused this feature to enroll able-bodied people without biometric data. This led UIDAI to intensify back-end checks, which led to large-scale rejection of enrolment packets.</p><p align="justify">Incidentally, the UIDAI has earlier rejected a home ministry suggestion for a security audit of Aadhar enrolment system.</p><p align="justify">Though UIDAI used to get demographic data verified manually by operators, this was discontinued in order to speed up Aadhar generation for DBT purposes. Even the feature of having government supervisors posted at each enrolment station was eased over time. First, the government supervisor was replaced by the enrolment agency's own supervisor, and then, one operator was allowed to become supervisor for another, defeating the purpose of having a supervisor.</p><p align="justify">&nbsp;</p>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'</pre><pre class="stack-trace">include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51</pre></div></pre>latest-news-updates/aadhaar-still-rife-with-security-flaws-bharti-jain-4673555.html"/> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link href="https://im4change.in/css/control.css" rel="stylesheet" type="text/css" media="all"/> <title>LATEST NEWS UPDATES | Aadhaar still rife with security flaws -Bharti Jain | Im4change.org</title> <meta name="description" content=" -The Times of India NEW DELHI: In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside..."/> <script src="https://im4change.in/js/jquery-1.10.2.js"></script> <script type="text/javascript" src="https://im4change.in/js/jquery-migrate.min.js"></script> <script language="javascript" type="text/javascript"> $(document).ready(function () { var img = $("img")[0]; // Get my img elem var pic_real_width, pic_real_height; $("<img/>") // Make in memory copy of image to avoid css issues .attr("src", $(img).attr("src")) .load(function () { pic_real_width = this.width; // Note: $(this).width() will not pic_real_height = this.height; // work for in memory images. }); }); </script> <style type="text/css"> @media screen { div.divFooter { display: block; } } @media print { .printbutton { display: none !important; } } </style> </head> <body> <table cellpadding="0" cellspacing="0" border="0" width="98%" align="center"> <tr> <td class="top_bg"> <div class="divFooter"> <img src="https://im4change.in/images/logo1.jpg" height="59" border="0" alt="Resource centre on India's rural distress" style="padding-top:14px;"/> </div> </td> </tr> <tr> <td id="topspace"> </td> </tr> <tr id="topspace"> <td> </td> </tr> <tr> <td height="50" style="border-bottom:1px solid #000; padding-top:10px;" class="printbutton"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> <tr> <td width="100%"> <h1 class="news_headlines" style="font-style:normal"> <strong>Aadhaar still rife with security flaws -Bharti Jain</strong></h1> </td> </tr> <tr> <td width="100%" style="font-family:Arial, 'Segoe Script', 'Segoe UI', sans-serif, serif"><font size="3"> <div align="justify">-The Times of India</div><p align="justify"><br /><em>NEW DELHI: </em>In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside its defined territory, including foreign land, to enroll people and send data to UIDAI for processing.</p><p align="justify">The anomaly led a UIDAI committee, set up in the wake of the government's January 2012 direction to the authority to make its enrolment process more robust, to recommend installation of a GPS device in all enrolment devices. This would ensure that enrolment happened only within the geographical boundary of India and also in the states allocated to UIDAI. The cost of such device was covered in the revised cost estimates approved by the cabinet committee on UIDAI. However, the GPS feature was never implemented.</p><p align="justify">According to experts, non-enablement of GPS feature in the Aadhar enrolment device poses a security risk as it is possible to enroll people in non-Aadhar states as well as foreign territory if the operator of the enrolment agency connives with someone. Since UIDAI allows enrolment of a person anywhere in the country by any enrolment agency, even if a few agencies get "compromised", a large number of ineligible people can get entry into the UIDAI database, thereby gaining access to banking services and DBT facility.</p><p align="justify">Though TOI repeatedly contacted UIDAI officials for their version, they were not forthcoming with a response.</p><p align="justify">The UIDAI's risk assessment exercise, assisted by HCL, also recommended other security upgrades such as scanning of proof of identity and proof of address documents furnished by the Aadhar applicant at enrolment, and uploading them as part of the enrolment packet. This way the enrolment data could be matched with scanned documents during a subsequent quality check. Scanning, however, would mean a delay of few minutes per enrolment, besides additional costs and manpower. Though UIDAI got the estimated extra cost on scanning approved by the CC-UIDAI, even this feature was never activated.</p><p align="justify">Even the offline system that UIDAI settled for to collect proof or identity/address documents, followed by their scanning by a vendor-document management service (DMS), has been far from perfect. Not only was the DMS late in picking up documents from the enrolment agencies, but it was found in some cases that the agencies never collected the documents. There were also instances of documents not matching details of the Aadhar applicant, or being torn.</p><p align="justify">Experts cautioned such weaknesses could be exploited by the enrolment agencies to enroll residents without any document, including for a monetary consideration. The risk assessment team had warned that with the connivance of the operator, it is possible that biometrics of a foreign national are captured to generate Aadhaar number to a local resident to give him two Aadhar numbers and also capture mixed biometrics of more than one person for a single enrolment.</p><p align="justify">Also found prone to misuse was a software that allows biometric exception cases. Primarily meant for the physically challenged, it enables such persons to be enrolled without fingerprints or iris scan. It has come to the UIDAI's notice that a few unscrupulous operators have misused this feature to enroll able-bodied people without biometric data. This led UIDAI to intensify back-end checks, which led to large-scale rejection of enrolment packets.</p><p align="justify">Incidentally, the UIDAI has earlier rejected a home ministry suggestion for a security audit of Aadhar enrolment system.</p><p align="justify">Though UIDAI used to get demographic data verified manually by operators, this was discontinued in order to speed up Aadhar generation for DBT purposes. Even the feature of having government supervisors posted at each enrolment station was eased over time. First, the government supervisor was replaced by the enrolment agency's own supervisor, and then, one operator was allowed to become supervisor for another, defeating the purpose of having a supervisor.</p><p align="justify"> </p> </font> </td> </tr> <tr> <td> </td> </tr> <tr> <td height="50" style="border-top:1px solid #000; border-bottom:1px solid #000;padding-top:10px;"> <form><input type="button" value=" Print this page " onclick="window.print();return false;"/></form> </td> </tr> </table></body> </html>' } $cookies = [] $values = [ (int) 0 => 'text/html; charset=UTF-8' ] $name = 'Content-Type' $first = true $value = 'text/html; charset=UTF-8'header - [internal], line ?? Cake\Http\ResponseEmitter::emitHeaders() - CORE/src/Http/ResponseEmitter.php, line 181 Cake\Http\ResponseEmitter::emit() - CORE/src/Http/ResponseEmitter.php, line 55 Cake\Http\Server::emit() - CORE/src/Http/Server.php, line 141 [main] - ROOT/webroot/index.php, line 39
<head>
<link rel="canonical" href="<?php echo Configure::read('SITE_URL'); ?><?php echo $urlPrefix;?><?php echo $article_current->category->slug; ?>/<?php echo $article_current->seo_url; ?>.html"/>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
$viewFile = '/home/brlfuser/public_html/src/Template/Layout/printlayout.ctp' $dataForView = [ 'article_current' => object(App\Model\Entity\Article) { 'id' => (int) 25521, 'title' => 'Aadhaar still rife with security flaws -Bharti Jain', 'subheading' => '', 'description' => '<div align="justify"> -The Times of India </div> <p align="justify"> <br /> <em>NEW DELHI: </em>In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside its defined territory, including foreign land, to enroll people and send data to UIDAI for processing. </p> <p align="justify"> The anomaly led a UIDAI committee, set up in the wake of the government's January 2012 direction to the authority to make its enrolment process more robust, to recommend installation of a GPS device in all enrolment devices. This would ensure that enrolment happened only within the geographical boundary of India and also in the states allocated to UIDAI. The cost of such device was covered in the revised cost estimates approved by the cabinet committee on UIDAI. However, the GPS feature was never implemented. </p> <p align="justify"> According to experts, non-enablement of GPS feature in the Aadhar enrolment device poses a security risk as it is possible to enroll people in non-Aadhar states as well as foreign territory if the operator of the enrolment agency connives with someone. Since UIDAI allows enrolment of a person anywhere in the country by any enrolment agency, even if a few agencies get "compromised", a large number of ineligible people can get entry into the UIDAI database, thereby gaining access to banking services and DBT facility. </p> <p align="justify"> Though TOI repeatedly contacted UIDAI officials for their version, they were not forthcoming with a response. </p> <p align="justify"> The UIDAI's risk assessment exercise, assisted by HCL, also recommended other security upgrades such as scanning of proof of identity and proof of address documents furnished by the Aadhar applicant at enrolment, and uploading them as part of the enrolment packet. This way the enrolment data could be matched with scanned documents during a subsequent quality check. Scanning, however, would mean a delay of few minutes per enrolment, besides additional costs and manpower. Though UIDAI got the estimated extra cost on scanning approved by the CC-UIDAI, even this feature was never activated. </p> <p align="justify"> Even the offline system that UIDAI settled for to collect proof or identity/address documents, followed by their scanning by a vendor-document management service (DMS), has been far from perfect. Not only was the DMS late in picking up documents from the enrolment agencies, but it was found in some cases that the agencies never collected the documents. There were also instances of documents not matching details of the Aadhar applicant, or being torn. </p> <p align="justify"> Experts cautioned such weaknesses could be exploited by the enrolment agencies to enroll residents without any document, including for a monetary consideration. The risk assessment team had warned that with the connivance of the operator, it is possible that biometrics of a foreign national are captured to generate Aadhaar number to a local resident to give him two Aadhar numbers and also capture mixed biometrics of more than one person for a single enrolment. </p> <p align="justify"> Also found prone to misuse was a software that allows biometric exception cases. Primarily meant for the physically challenged, it enables such persons to be enrolled without fingerprints or iris scan. It has come to the UIDAI's notice that a few unscrupulous operators have misused this feature to enroll able-bodied people without biometric data. This led UIDAI to intensify back-end checks, which led to large-scale rejection of enrolment packets. </p> <p align="justify"> Incidentally, the UIDAI has earlier rejected a home ministry suggestion for a security audit of Aadhar enrolment system. </p> <p align="justify"> Though UIDAI used to get demographic data verified manually by operators, this was discontinued in order to speed up Aadhar generation for DBT purposes. Even the feature of having government supervisors posted at each enrolment station was eased over time. First, the government supervisor was replaced by the enrolment agency's own supervisor, and then, one operator was allowed to become supervisor for another, defeating the purpose of having a supervisor. </p> <p align="justify"> </p>', 'credit_writer' => 'The Times of India, 27 July, 2014, http://timesofindia.indiatimes.com/india/Aadhaar-still-rife-with-security-flaws/articleshow/39076802.cms', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'aadhaar-still-rife-with-security-flaws-bharti-jain-4673555', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 4673555, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ [maximum depth reached] ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ [maximum depth reached] ], '[dirty]' => [[maximum depth reached]], '[original]' => [[maximum depth reached]], '[virtual]' => [[maximum depth reached]], '[hasErrors]' => false, '[errors]' => [[maximum depth reached]], '[invalid]' => [[maximum depth reached]], '[repository]' => 'Articles' }, 'articleid' => (int) 25521, 'metaTitle' => 'LATEST NEWS UPDATES | Aadhaar still rife with security flaws -Bharti Jain', 'metaKeywords' => 'aadhaar,UIDAI,uid', 'metaDesc' => ' -The Times of India NEW DELHI: In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside...', 'disp' => '<div align="justify">-The Times of India</div><p align="justify"><br /><em>NEW DELHI: </em>In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside its defined territory, including foreign land, to enroll people and send data to UIDAI for processing.</p><p align="justify">The anomaly led a UIDAI committee, set up in the wake of the government's January 2012 direction to the authority to make its enrolment process more robust, to recommend installation of a GPS device in all enrolment devices. This would ensure that enrolment happened only within the geographical boundary of India and also in the states allocated to UIDAI. The cost of such device was covered in the revised cost estimates approved by the cabinet committee on UIDAI. However, the GPS feature was never implemented.</p><p align="justify">According to experts, non-enablement of GPS feature in the Aadhar enrolment device poses a security risk as it is possible to enroll people in non-Aadhar states as well as foreign territory if the operator of the enrolment agency connives with someone. Since UIDAI allows enrolment of a person anywhere in the country by any enrolment agency, even if a few agencies get "compromised", a large number of ineligible people can get entry into the UIDAI database, thereby gaining access to banking services and DBT facility.</p><p align="justify">Though TOI repeatedly contacted UIDAI officials for their version, they were not forthcoming with a response.</p><p align="justify">The UIDAI's risk assessment exercise, assisted by HCL, also recommended other security upgrades such as scanning of proof of identity and proof of address documents furnished by the Aadhar applicant at enrolment, and uploading them as part of the enrolment packet. This way the enrolment data could be matched with scanned documents during a subsequent quality check. Scanning, however, would mean a delay of few minutes per enrolment, besides additional costs and manpower. Though UIDAI got the estimated extra cost on scanning approved by the CC-UIDAI, even this feature was never activated.</p><p align="justify">Even the offline system that UIDAI settled for to collect proof or identity/address documents, followed by their scanning by a vendor-document management service (DMS), has been far from perfect. Not only was the DMS late in picking up documents from the enrolment agencies, but it was found in some cases that the agencies never collected the documents. There were also instances of documents not matching details of the Aadhar applicant, or being torn.</p><p align="justify">Experts cautioned such weaknesses could be exploited by the enrolment agencies to enroll residents without any document, including for a monetary consideration. The risk assessment team had warned that with the connivance of the operator, it is possible that biometrics of a foreign national are captured to generate Aadhaar number to a local resident to give him two Aadhar numbers and also capture mixed biometrics of more than one person for a single enrolment.</p><p align="justify">Also found prone to misuse was a software that allows biometric exception cases. Primarily meant for the physically challenged, it enables such persons to be enrolled without fingerprints or iris scan. It has come to the UIDAI's notice that a few unscrupulous operators have misused this feature to enroll able-bodied people without biometric data. This led UIDAI to intensify back-end checks, which led to large-scale rejection of enrolment packets.</p><p align="justify">Incidentally, the UIDAI has earlier rejected a home ministry suggestion for a security audit of Aadhar enrolment system.</p><p align="justify">Though UIDAI used to get demographic data verified manually by operators, this was discontinued in order to speed up Aadhar generation for DBT purposes. Even the feature of having government supervisors posted at each enrolment station was eased over time. First, the government supervisor was replaced by the enrolment agency's own supervisor, and then, one operator was allowed to become supervisor for another, defeating the purpose of having a supervisor.</p><p align="justify"> </p>', 'lang' => 'English', 'SITE_URL' => 'https://im4change.in/', 'site_title' => 'im4change', 'adminprix' => 'admin' ] $article_current = object(App\Model\Entity\Article) { 'id' => (int) 25521, 'title' => 'Aadhaar still rife with security flaws -Bharti Jain', 'subheading' => '', 'description' => '<div align="justify"> -The Times of India </div> <p align="justify"> <br /> <em>NEW DELHI: </em>In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside its defined territory, including foreign land, to enroll people and send data to UIDAI for processing. </p> <p align="justify"> The anomaly led a UIDAI committee, set up in the wake of the government's January 2012 direction to the authority to make its enrolment process more robust, to recommend installation of a GPS device in all enrolment devices. This would ensure that enrolment happened only within the geographical boundary of India and also in the states allocated to UIDAI. The cost of such device was covered in the revised cost estimates approved by the cabinet committee on UIDAI. However, the GPS feature was never implemented. </p> <p align="justify"> According to experts, non-enablement of GPS feature in the Aadhar enrolment device poses a security risk as it is possible to enroll people in non-Aadhar states as well as foreign territory if the operator of the enrolment agency connives with someone. Since UIDAI allows enrolment of a person anywhere in the country by any enrolment agency, even if a few agencies get "compromised", a large number of ineligible people can get entry into the UIDAI database, thereby gaining access to banking services and DBT facility. </p> <p align="justify"> Though TOI repeatedly contacted UIDAI officials for their version, they were not forthcoming with a response. </p> <p align="justify"> The UIDAI's risk assessment exercise, assisted by HCL, also recommended other security upgrades such as scanning of proof of identity and proof of address documents furnished by the Aadhar applicant at enrolment, and uploading them as part of the enrolment packet. This way the enrolment data could be matched with scanned documents during a subsequent quality check. Scanning, however, would mean a delay of few minutes per enrolment, besides additional costs and manpower. Though UIDAI got the estimated extra cost on scanning approved by the CC-UIDAI, even this feature was never activated. </p> <p align="justify"> Even the offline system that UIDAI settled for to collect proof or identity/address documents, followed by their scanning by a vendor-document management service (DMS), has been far from perfect. Not only was the DMS late in picking up documents from the enrolment agencies, but it was found in some cases that the agencies never collected the documents. There were also instances of documents not matching details of the Aadhar applicant, or being torn. </p> <p align="justify"> Experts cautioned such weaknesses could be exploited by the enrolment agencies to enroll residents without any document, including for a monetary consideration. The risk assessment team had warned that with the connivance of the operator, it is possible that biometrics of a foreign national are captured to generate Aadhaar number to a local resident to give him two Aadhar numbers and also capture mixed biometrics of more than one person for a single enrolment. </p> <p align="justify"> Also found prone to misuse was a software that allows biometric exception cases. Primarily meant for the physically challenged, it enables such persons to be enrolled without fingerprints or iris scan. It has come to the UIDAI's notice that a few unscrupulous operators have misused this feature to enroll able-bodied people without biometric data. This led UIDAI to intensify back-end checks, which led to large-scale rejection of enrolment packets. </p> <p align="justify"> Incidentally, the UIDAI has earlier rejected a home ministry suggestion for a security audit of Aadhar enrolment system. </p> <p align="justify"> Though UIDAI used to get demographic data verified manually by operators, this was discontinued in order to speed up Aadhar generation for DBT purposes. Even the feature of having government supervisors posted at each enrolment station was eased over time. First, the government supervisor was replaced by the enrolment agency's own supervisor, and then, one operator was allowed to become supervisor for another, defeating the purpose of having a supervisor. </p> <p align="justify"> </p>', 'credit_writer' => 'The Times of India, 27 July, 2014, http://timesofindia.indiatimes.com/india/Aadhaar-still-rife-with-security-flaws/articleshow/39076802.cms', 'article_img' => '', 'article_img_thumb' => '', 'status' => (int) 1, 'show_on_home' => (int) 1, 'lang' => 'EN', 'category_id' => (int) 16, 'tag_keyword' => '', 'seo_url' => 'aadhaar-still-rife-with-security-flaws-bharti-jain-4673555', 'meta_title' => null, 'meta_keywords' => null, 'meta_description' => null, 'noindex' => (int) 0, 'publish_date' => object(Cake\I18n\FrozenDate) {}, 'most_visit_section_id' => null, 'article_big_img' => null, 'liveid' => (int) 4673555, 'created' => object(Cake\I18n\FrozenTime) {}, 'modified' => object(Cake\I18n\FrozenTime) {}, 'edate' => '', 'tags' => [ (int) 0 => object(Cake\ORM\Entity) {}, (int) 1 => object(Cake\ORM\Entity) {}, (int) 2 => object(Cake\ORM\Entity) {} ], 'category' => object(App\Model\Entity\Category) {}, '[new]' => false, '[accessible]' => [ '*' => true, 'id' => false ], '[dirty]' => [], '[original]' => [], '[virtual]' => [], '[hasErrors]' => false, '[errors]' => [], '[invalid]' => [], '[repository]' => 'Articles' } $articleid = (int) 25521 $metaTitle = 'LATEST NEWS UPDATES | Aadhaar still rife with security flaws -Bharti Jain' $metaKeywords = 'aadhaar,UIDAI,uid' $metaDesc = ' -The Times of India NEW DELHI: In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside...' $disp = '<div align="justify">-The Times of India</div><p align="justify"><br /><em>NEW DELHI: </em>In what could point to serious security loopholes in Aadhar project, an internal risk assessment by the Unique Identification Authority of India (UIDAI) in 2012 had found that the enrolment device could be taken outside its defined territory, including foreign land, to enroll people and send data to UIDAI for processing.</p><p align="justify">The anomaly led a UIDAI committee, set up in the wake of the government's January 2012 direction to the authority to make its enrolment process more robust, to recommend installation of a GPS device in all enrolment devices. This would ensure that enrolment happened only within the geographical boundary of India and also in the states allocated to UIDAI. The cost of such device was covered in the revised cost estimates approved by the cabinet committee on UIDAI. However, the GPS feature was never implemented.</p><p align="justify">According to experts, non-enablement of GPS feature in the Aadhar enrolment device poses a security risk as it is possible to enroll people in non-Aadhar states as well as foreign territory if the operator of the enrolment agency connives with someone. Since UIDAI allows enrolment of a person anywhere in the country by any enrolment agency, even if a few agencies get "compromised", a large number of ineligible people can get entry into the UIDAI database, thereby gaining access to banking services and DBT facility.</p><p align="justify">Though TOI repeatedly contacted UIDAI officials for their version, they were not forthcoming with a response.</p><p align="justify">The UIDAI's risk assessment exercise, assisted by HCL, also recommended other security upgrades such as scanning of proof of identity and proof of address documents furnished by the Aadhar applicant at enrolment, and uploading them as part of the enrolment packet. This way the enrolment data could be matched with scanned documents during a subsequent quality check. Scanning, however, would mean a delay of few minutes per enrolment, besides additional costs and manpower. Though UIDAI got the estimated extra cost on scanning approved by the CC-UIDAI, even this feature was never activated.</p><p align="justify">Even the offline system that UIDAI settled for to collect proof or identity/address documents, followed by their scanning by a vendor-document management service (DMS), has been far from perfect. Not only was the DMS late in picking up documents from the enrolment agencies, but it was found in some cases that the agencies never collected the documents. There were also instances of documents not matching details of the Aadhar applicant, or being torn.</p><p align="justify">Experts cautioned such weaknesses could be exploited by the enrolment agencies to enroll residents without any document, including for a monetary consideration. The risk assessment team had warned that with the connivance of the operator, it is possible that biometrics of a foreign national are captured to generate Aadhaar number to a local resident to give him two Aadhar numbers and also capture mixed biometrics of more than one person for a single enrolment.</p><p align="justify">Also found prone to misuse was a software that allows biometric exception cases. Primarily meant for the physically challenged, it enables such persons to be enrolled without fingerprints or iris scan. It has come to the UIDAI's notice that a few unscrupulous operators have misused this feature to enroll able-bodied people without biometric data. This led UIDAI to intensify back-end checks, which led to large-scale rejection of enrolment packets.</p><p align="justify">Incidentally, the UIDAI has earlier rejected a home ministry suggestion for a security audit of Aadhar enrolment system.</p><p align="justify">Though UIDAI used to get demographic data verified manually by operators, this was discontinued in order to speed up Aadhar generation for DBT purposes. Even the feature of having government supervisors posted at each enrolment station was eased over time. First, the government supervisor was replaced by the enrolment agency's own supervisor, and then, one operator was allowed to become supervisor for another, defeating the purpose of having a supervisor.</p><p align="justify"> </p>' $lang = 'English' $SITE_URL = 'https://im4change.in/' $site_title = 'im4change' $adminprix = 'admin'
include - APP/Template/Layout/printlayout.ctp, line 8 Cake\View\View::_evaluate() - CORE/src/View/View.php, line 1413 Cake\View\View::_render() - CORE/src/View/View.php, line 1374 Cake\View\View::renderLayout() - CORE/src/View/View.php, line 927 Cake\View\View::render() - CORE/src/View/View.php, line 885 Cake\Controller\Controller::render() - CORE/src/Controller/Controller.php, line 791 Cake\Http\ActionDispatcher::_invoke() - CORE/src/Http/ActionDispatcher.php, line 126 Cake\Http\ActionDispatcher::dispatch() - CORE/src/Http/ActionDispatcher.php, line 94 Cake\Http\BaseApplication::__invoke() - CORE/src/Http/BaseApplication.php, line 235 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\RoutingMiddleware::__invoke() - CORE/src/Routing/Middleware/RoutingMiddleware.php, line 162 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Routing\Middleware\AssetMiddleware::__invoke() - CORE/src/Routing/Middleware/AssetMiddleware.php, line 88 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Error\Middleware\ErrorHandlerMiddleware::__invoke() - CORE/src/Error/Middleware/ErrorHandlerMiddleware.php, line 96 Cake\Http\Runner::__invoke() - CORE/src/Http/Runner.php, line 65 Cake\Http\Runner::run() - CORE/src/Http/Runner.php, line 51
![]() |
Aadhaar still rife with security flaws -Bharti Jain |
-The Times of India
The anomaly led a UIDAI committee, set up in the wake of the government's January 2012 direction to the authority to make its enrolment process more robust, to recommend installation of a GPS device in all enrolment devices. This would ensure that enrolment happened only within the geographical boundary of India and also in the states allocated to UIDAI. The cost of such device was covered in the revised cost estimates approved by the cabinet committee on UIDAI. However, the GPS feature was never implemented. According to experts, non-enablement of GPS feature in the Aadhar enrolment device poses a security risk as it is possible to enroll people in non-Aadhar states as well as foreign territory if the operator of the enrolment agency connives with someone. Since UIDAI allows enrolment of a person anywhere in the country by any enrolment agency, even if a few agencies get "compromised", a large number of ineligible people can get entry into the UIDAI database, thereby gaining access to banking services and DBT facility. Though TOI repeatedly contacted UIDAI officials for their version, they were not forthcoming with a response. The UIDAI's risk assessment exercise, assisted by HCL, also recommended other security upgrades such as scanning of proof of identity and proof of address documents furnished by the Aadhar applicant at enrolment, and uploading them as part of the enrolment packet. This way the enrolment data could be matched with scanned documents during a subsequent quality check. Scanning, however, would mean a delay of few minutes per enrolment, besides additional costs and manpower. Though UIDAI got the estimated extra cost on scanning approved by the CC-UIDAI, even this feature was never activated. Even the offline system that UIDAI settled for to collect proof or identity/address documents, followed by their scanning by a vendor-document management service (DMS), has been far from perfect. Not only was the DMS late in picking up documents from the enrolment agencies, but it was found in some cases that the agencies never collected the documents. There were also instances of documents not matching details of the Aadhar applicant, or being torn. Experts cautioned such weaknesses could be exploited by the enrolment agencies to enroll residents without any document, including for a monetary consideration. The risk assessment team had warned that with the connivance of the operator, it is possible that biometrics of a foreign national are captured to generate Aadhaar number to a local resident to give him two Aadhar numbers and also capture mixed biometrics of more than one person for a single enrolment. Also found prone to misuse was a software that allows biometric exception cases. Primarily meant for the physically challenged, it enables such persons to be enrolled without fingerprints or iris scan. It has come to the UIDAI's notice that a few unscrupulous operators have misused this feature to enroll able-bodied people without biometric data. This led UIDAI to intensify back-end checks, which led to large-scale rejection of enrolment packets. Incidentally, the UIDAI has earlier rejected a home ministry suggestion for a security audit of Aadhar enrolment system. Though UIDAI used to get demographic data verified manually by operators, this was discontinued in order to speed up Aadhar generation for DBT purposes. Even the feature of having government supervisors posted at each enrolment station was eased over time. First, the government supervisor was replaced by the enrolment agency's own supervisor, and then, one operator was allowed to become supervisor for another, defeating the purpose of having a supervisor.
|